Showing 1,821 - 1,840 results of 2,784 for search '((((( usedds OR useddds) OR useddds) OR uses) privacy data ) OR ( use privacy data ))', query time: 0.24s Refine Results
  1. 1821

    A Survey of Machine Learning in Edge Computing: Techniques, Frameworks, Applications, Issues, and Research Directions by Oumayma Jouini, Kaouthar Sethom, Abdallah Namoun, Nasser Aljohani, Meshari Huwaytim Alanazi, Mohammad N. Alanazi

    Published 2024-06-01
    “…Hot topics included big data, cloud, edge, multimedia, security, privacy, QoS, and activity recognition, while critical domains included industry, healthcare, agriculture, transportation, smart homes and cities, and assisted living. …”
    Get full text
    Article
  2. 1822

    Health system bottlenecks hindering provision of supportive and dignified maternity care in public health facilities. by Waqas Hameed, Bushra Khan, Sameen Siddiqi, Muhammad Asim, Bilal Iqbal Avan

    Published 2022-01-01
    “…A combination of inductive and deductive approach was used for data analyses. Our study identified range of bottlenecks impeding provision of RMC. …”
    Get full text
    Article
  3. 1823

    How do strategic attributes of electronic commerce impel the perceived value and electronic loyalty of online food delivery applications (OFDAs) by Muhammad Asif Zaheer, Tanveer Muhammad Anwar, Zoia Khan, Muhammad Ali Raza, Hira Hafeez

    Published 2024-08-01
    “…Design/methodology/approach – The study was quantitative and data were collected from 509 consumers of the district of Rawalpindi, Punjab Pakistan by using a convenience sampling technique who was the users of OFDAs to evaluate the proposed research model. …”
    Get full text
    Article
  4. 1824
  5. 1825

    Efficient encrypted image retrieval in IoT-cloud with multi-user authentication by Mustafa A Al Sibahee, Songfeng Lu, Zaid Ameen Abduljabbar, Ayad Ibrahim, Zaid Alaa Hussien, Keyan Abdul-Aziz Mutlaq, Mohammed Abdulridha Hussain

    Published 2018-02-01
    “…Encryption is one of the best methods to safeguard the security and privacy of an image. However, looking through encrypted data is difficult. …”
    Get full text
    Article
  6. 1826

    Improving the Accuracy of mmWave Radar for Ethical Patient Monitoring in Mental Health Settings by Colm Dowling, Hadi Larijani, Mike Mannion, Matt Marais, Simon Black

    Published 2024-09-01
    “…In line with these challenges, we propose a novel low-data solution to mitigate the impact of multipath reflections and other sources of noise in mmWave sensing. …”
    Get full text
    Article
  7. 1827

    The Influence of Fintech on the National Security System: Law, Economic Potential and Digital Defense Strategy by Ngasiman Djoyonegoro, Muhammad Noor Harisudin, Hariyanto Hariyanto

    Published 2025-06-01
    “…Governments need to implement stringent regulations to safeguard Fintech user data and privacy and closely supervise Fintech operations to mitigate the risks of financial technology misuse. …”
    Get full text
    Article
  8. 1828

    The Role of Artificial Intelligence in Medical Imaging: From Diagnosis to Ethical Frontiers by Nouf Abuhadi

    Published 2025-03-01
    “…The challenges AI encounters in radiography include the ‘black box’ issue, accuracy of data, technological and infrastructural complexity, ethical issues such as patient privacy and data security, overreliance on AI, and bias. …”
    Get full text
    Article
  9. 1829

    Exploring the Barriers and Facilitators to Implementing a Smartphone App for Physicians to Improve the Management of Acute Myocardial Infarctions: Multicenter, Mixed Methods, Obser... by Katelyn J Cullen, Hassan Mir, Madhu K Natarajan, Marija Corovic, Karen Mosleh, Jacob Crawshaw, Mathew Mercuri, Hassan Masoom, JD Schwalm

    Published 2025-07-01
    “…The surveys identified key barriers around technology, privacy, and access to required Wi-Fi that needed to be addressed during app implementation to facilitate uptake and use. …”
    Get full text
    Article
  10. 1830

    The Intersection of AI, Ethics, and Journalism: Greek Journalists’ and Academics’ Perspectives by Panagiota (Naya) Kalfeli, Christina Angeli

    Published 2025-01-01
    “…Regarding ethical concerns, there is evident skepticism and caution among journalists and academics about issues, such as, data bias, transparency, privacy, and copyright, which are further intensified by the absence of a regulatory framework.…”
    Get full text
    Article
  11. 1831

    A Trusted Federated Learning Method Based on Consortium Blockchain by Xiaojun Yin, Xijun Wu, Xinming Zhang

    Published 2024-12-01
    “…Federated learning (FL) has gained significant attention in distributed machine learning due to its ability to protect data privacy while enabling model training across decentralized data sources. …”
    Get full text
    Article
  12. 1832

    Public awareness, attitudes, and motivation toward biobanks: a survey of China by Mingtao Huang, Lanyi Yu, Xiaonan Wang, Kun Li, Jichao Wang, Xinrui Cheng, Xiaomei Zhai

    Published 2025-01-01
    “…The respondents raised concerns about the commercialization of biobanks (56.66%) and data privacy (55.84%). Notably, only 37.01% of the respondents were concerned about the risk of discrimination in biobanks, where this was lower compared with the results for populations in Western countries. …”
    Get full text
    Article
  13. 1833

    A Survey on Public Key Encryption with Keyword Search: Taxonomy and Methods by M.H. Noorallahzade, R. Alimoradi, A. Gholami

    Published 2022-01-01
    “…Given the many benefits that cloud computing brings, organizations tend to outsource most of their data to reduce a large portion of their costs, but concern about the privacy of data is a major obstacle to outsourcing sensitive data. …”
    Get full text
    Article
  14. 1834

    BERTinchamps: Cost-Effective In-House Training of Language Models in French by Amaury Fierens, Sébastien Jodogne

    Published 2024-12-01
    “…While training LMs directly inside an institution is desirable for leveraging local data and addressing data privacy concerns, this process demands a costly and complex computational infrastructure. …”
    Get full text
    Article
  15. 1835

    Association between sedentary behaviour and chronic pelvic pain in women: a protocol for systematic review and meta-analysis by Lei Tang, Guohua Wang, Yangyan Guo

    Published 2025-05-01
    “…The research team will ensure data privacy and participant confidentiality through anonymised data processing and strict compliance with relevant regulations. …”
    Get full text
    Article
  16. 1836

    Advancements of Deep Learning Model-Based Rehabilitation Training System by Xu Chiyu

    Published 2025-01-01
    “…The experimental results show that there is still room for the development of rehabilitation training assessment systems in terms of privacy, interpretation ability, and application scenarios, and that researchers can address the above issues by using federated learning, developing an expert system, and using transfer learning domain adaptation, respectively.…”
    Get full text
    Article
  17. 1837

    Factors influencing academic staff satisfaction and continuous usage of generative artificial intelligence (GenAI) in higher education by Maria Ijaz Baig, Elaheh Yadegaridehkordi

    Published 2025-02-01
    “…Therefore, this study aims to identify factors influencing academic staff satisfaction and continuous GenAI usage in higher education, employing a survey method and analyzing data using Partial Least Squares Structural Equation Modeling (PLS-SEM). …”
    Get full text
    Article
  18. 1838

    SortAlign: a score-based aggregation technique for neural networks in one-round federated learning by Antonio Nappa, Oihan Joyot, Izar Azpiroz, Juan Luis Ferrando Chacón, Mikel Sáez de Buruaga

    Published 2024-12-01
    “…In recent years, the growth of data generated on a daily basis in critical domains, such as industrial processes, where data privacy plays a key role, has led to the strong development of Federated Learning. …”
    Get full text
    Article
  19. 1839

    An Elderly Fall Detection Method Based on Federated Learning and Extreme Learning Machine (Fed-ELM) by Zhigang Yu, Jiahui Liu, Mingchuan Yang, Yanmin Cheng, Jie Hu, Xinchi Li

    Published 2022-01-01
    “…Then, Federated Learning is applied to share data information among different users without involving user privacy. …”
    Get full text
    Article
  20. 1840

    Blockchain driven medical image encryption employing chaotic tent map in cloud computing by Usman Shahid, Shamsa Kanwal, Mahwish Bano, Saba Inam, Manal Elzain Mohamed Abdalla, Zaffar Ahmed Shaikh

    Published 2025-02-01
    “…To sum up, the BCTMES effectively addresses a number of prevalent risks to picture security and offers a complete solution that may be implemented in cloud-based settings where data integrity and privacy are crucial. This work suggests a promising path for further investigation and practical uses in secure image transmission.…”
    Get full text
    Article